Cyber Warfare & Inadvertent Escalation

Cyber Warfare & Inadvertent Escalation

詹姆斯·M. Acton

The advent of cyber warfare exacerbates the risk of inadvertent nuclear escalation
in a conventional conflict. In theory, cyber espionage and cyberattacks could en-
hance one state’s ability to undermine another’s nuclear deterrent. Regardless of
how effective such operations might prove in practice, fear of them could generate
escalatory “use-’em-before-you-lose-’em” pressures. 此外, cyber threats
could create three qualitatively new mechanisms by which a nuclear-armed state
might incorrectly conclude that its nuclear deterrent was under attack. 第一的, 网络
espionage could be mistaken for a cyberattack. 第二, malware could accidentally
spread from systems that supported non-nuclear operations to nuclear-related sys-
特姆斯. 第三, an operation carried out by a third party could be misattributed by one
state in a bilateral confrontation to its opponent. Two approaches to risk reduction
are potentially viable in the short term: unilateral restraint in conducting potentially
escalatory cyber operations, and bilateral or multilateral behavioral norms.

C yber weapons may be relatively new, but non-nuclear threats to nuclear

weapons and their command, 控制, 沟通, and intelligence
(C3I) systems are not. 实际上, before the United States dropped the bomb
on Hiroshima in August 1945–before it even conducted the world’s first nuclear
test in July of that year–it had started to worry about non-nuclear threats to its
nascent nuclear force, 尤其, Japanese air defenses.1 As the Cold War de-
veloped, fears multiplied to encompass threats to almost every component of
the United States’ nuclear forces and C3I systems. While these threats emanat-
ed primarily from Moscow’s nuclear forces, they were exacerbated by its improv-
ing non-nuclear capabilities, particularly in the final decade of the Cold War. A
two-decade hiatus in worry following the Soviet Union’s collapse is now over;
今天, non-nuclear threats to U.S. nuclear C3I assets–in particular, the growing
capability of Chinese and Russian antisatellite weapons–are a major concern.2

The United States’ experience is the norm. All nuclear-armed states have felt,
and continue to feel, similar concerns. 的确, the last few decades have seen the
emergence of new potential vulnerabilities–this time in cyberspace–as nuclear
weapons and C3I systems have come to rely increasingly on digital technology. 到
be sure, the networks involved in nuclear operations are almost certainly among
the most secure anywhere. Yet there is broad agreement among technical experts

133

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

© 2020 by James M. Acton https://doi.org/10.1162/DAED_a_01794

that perfect network security is “impossible.”3 As a result, the possibility of cyber
interference with nuclear forces and C3I systems is real.

The vulnerability of nuclear forces and C3I systems creates the risk of inad-
vertent escalation: 那是, escalation resulting from military operations or threats
that are not intended to be escalatory. So-called crisis instability, 例如,
could arise if a state were afraid of being disarmed more or less completely in a
preemptive strike by an adversary, whether or not such fears were well founded.4
In the most extreme case, “use-’em-or-lose-’em” pressures could lead the state to
employ nuclear weapons, conceivably in its own preemptive attempt to disarm its
adversary, but more likely in a limited way to try to terrify the opponent into back-
ing down. In less extreme scenarios, a state afraid of being disarmed might take
steps–issuing nuclear threats, 例如, or dispersing mobile nuclear forces–
that raised the likelihood of nuclear use later.

This danger is likely to be exacerbated by any cyber vulnerabilities affecting
nuclear forces and C3I systems. Most directly, the existence of such vulnerabili-
ties could intensify existing fears of being disarmed–fears that are already acute
in China and Russia (as well as in Pakistan and, most likely, 北朝鲜).5 如何-
曾经, because of their unique characteristics and effects, cyber threats could create
at least three qualitatively new mechanisms by which a nuclear-armed state might
come to the incorrect conclusion that its nuclear deterrent was under threat. 第一的,
the purpose of cyber interference could be misinterpreted. 尤其, espio-
nage could be mistaken for an attack. 第二, a cyberattack could have a more
significant effect than intended. Malware implanted into information technology
(它) systems associated with non-nuclear weapons could accidentally spread into
more sensitive nuclear-related systems, 例如. 第三, the initiator of a cyber
operation could be misidentified. An operation carried out by a third party, 对于前任-
充足, could be misattributed by one state in a bilateral confrontation to its oppo-
尼特. What makes these pathways so pernicious is that the catalyst for escalation
could appear to its initiator to be a relatively benign action.

To make matters worse, such pathways could lead to inadvertent escalation
even if the target of the cyber interference were not afraid of being completely dis-
armed. Today at least, this description fits the United States. 如果, in a conflict against
俄罗斯, 说, the United States wrongly concluded that its strategic early-warning
system was under cyberattack, it might reason that Moscow was seeking to under-
mine U.S. missile defenses, which use early-warning data, prior to launching a nu-
clear attack.6 Given that U.S. declaratory policy explicitly highlights the option of
a nuclear response to non-nuclear attacks on nuclear C3I assets, such a “misinter-
preted warning” might lead Washington to use nuclear weapons.7 But even if it did
不是, its response, which might include nuclear threats, could still be escalatory.

My focus here is narrowly limited to inadvertent cyber threats against, or inter-
ference with, one state’s nuclear forces or C3I systems by another nuclear-armed

134

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

状态 (C3I systems encompass not only communication capabilities, 但也
智力, 监视, and reconnaissance capabilities, including early warn-
英, that would be critical to decision-making). 为了确定, cyber vulnerabilities
probably create other escalation risks too, 尽管, in my judgment, they are less
serious.8 For example, while no state would likely try to detonate another’s nucle-
ar weapons, a nihilistic terrorist group might (though it is unclear whether such
a group could obtain the requisite cyber capabilities). Separately, vulnerabilities
associated with conventional forces or their C3I systems could increase the likeli-
hood of a conventional war’s escalating to a higher level of violence, thus making
nuclear use more credible.9

C yber interference with nuclear forces and C3I systems can involve two (不是

mutually exclusive) types of operations: espionage and attack. Cyber es-
pionage involves collecting data from a target IT system without other-
wise damaging it. A cyberattack involves undermining the operations of the tar-
get system, typically by compromising the integrity or availability of data. Cyber
tools suitable for surveilling or attacking nuclear forces or C3I systems have in-
numerable differences from noncyber tools, which are themselves quite varied.
Six of these differences are particularly salient to the risk of inadvertent nuclear
escalation.

第一的, cyber espionage offers the potential to obtain information about an ad-
versary’s military forces and operations that cannot plausibly be obtained in any
另一种方式. By accessing an adversary’s C3I systems directly, cyber tools may be ca-
pable of exfiltrating exceptionally sensitive information, such as the locations of
mobile delivery systems. This is not to suggest that cyber surveillance is infallible.
As a security measure, 例如, a state could choose not to track the move-
ments of its mobile delivery systems (or it could do so only approximately). 铝-
ternatively or additionally, it could try to use a cyber intrusion in its networks to
feed misinformation to the adversary. In spite of these and other limitations, 如何-
曾经, cyber espionage almost certainly offers unique advantages. 例如, 不
practical constellation of high-resolution surveillance satellites in low Earth orbit
could provide continuous coverage of a given location on Earth’s surface.10 Cyber
监视, 相比之下, may allow for continuous monitoring of an adversary’s
military posture.

第二, cyber weapons offer an unparalleled capability to manipulate the data
that go into decision-making. Other types of weapons, by destroying or disabling
sensors or communication systems, can also deny data to decision-makers. 如何-
曾经, their use generally alerts the target to the fact it is under attack. 相比之下,
if a well-designed cyber weapon is used, a loss of data may appear to be, 说, 这
result of a malfunction, potentially allowing the attacker to conduct surprise fol-
low-on attacks. Even more significant, cyber weapons can be used to feed false

135

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149 (2) Spring 2020James M. Acton

information to decision-makers. 例如, the Stuxnet virus, which was re-
portedly developed by the United States and Israel, was designed not only to de-
stroy centrifuges at Iran’s Natanz enrichment plant, but also to hinder plant op-
erators from discovering the cause of these failures by producing falsely reassur-
ing readings on monitoring equipment.11 In a similar vein, sophisticated cyber
weapons offer a unique capability to shape an adversary’s perception of a battle-
field by feeding misinformation into C3I systems.12 To be sure, information oper-
ations have always been a part of warfare. 然而, cyber weapons represent a
sea change because their effects can be tailored with great precision in real time,
and because they could be used to directly influence the perceptions of high- 等级
decision-makers.

第三, cyber operations–whether conducted for espionage or offensive pur-
poses–can present particularly significant risks of unanticipated collateral effects,
那是, of affecting IT systems other than the intended target.13 Noncyber weap-
ons can, 当然, lead to collateral damage. Yet such effects are inherently con-
strained by geography. 而且, the likelihood of physical collateral damage can
be often quantified, at least to some extent (military planners may be able to es-
timate, 例如, the probability of an incoming weapon missing its military
target and hitting a nearby civilian facility).14 The risks of collateral effects in cy-
berspace are much more difficult to estimate. Minimizing such effects relies, 在
部分, on detailed intelligence about the target network and on connections be-
tween it and other networks. Obtaining the requisite intelligence is potentially
much more difficult than identifying what surrounds a target in physical space (作为
is verifying that the resulting picture is complete). To complicate matters further,
sophisticated malware must generally be tailored to each target and, if revealed,
will become ineffective once the adversary can clean its networks and fix whatev-
er exploit was used to gain access. 因此, the effects of cyber weapons cannot
usually be understood through testing, further increasing the likelihood of unan-
ticipated collateral damage (simulations can be used but they are only as good as
the available intelligence on the target).

第四, in peacetime, malware used to enable a cyberattack may often be in-
serted into an enemy’s networks–but not activated–in the hope that it will re-
main undetected and thus can be used in a potential future crisis or conflict. (在
理论, not only can a vulnerability in an operational IT system be exploited in
这边走, but so too could security weaknesses in the supply chain for the system’s
components.) Noncyber weapons, 相比之下, are generally used as and when the
decision to authorize a strike on a particular target is taken.15 One consequence of
this difference is that, if a state discovers dormant malware in its networks, it can
be faced with the challenge of attributing it–that is, identifying which entity is
responsible for its implantation–before activation. The equivalent challenge rare-
ly arises with the kinds of noncyber weapons typically used in interstate warfare

136

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

(though it does arise in irregular warfare or counterterrorism with unexploded
ordnance).

第五, and relatedly, cyberattacks are generally easier to conceal than other
forms of attack. 因此, decision-makers may be more inclined to authorize
他们. 实际上, if the goal is for a cyber weapon to have either a persistent effect or
an effect when triggered at some future time, the malware used in the attack must
remain hidden to be effective because exposure could enable the adversary to take
countermeasures.

Sixth, 最后, distinguishing between offensive operations and espio-
nage is significantly more challenging in cyberspace than in other domains.16 To
be sure, the line dividing espionage and offensive operations in physical space is
not always entirely clear. Aircraft–unmanned aerial vehicles (UAVs), 尤其
–are used for both surveillance and offensive operations. But the distinction is
much murkier in cyberspace. One challenge is that identifying the purpose of a
piece of malware–understanding whether it can be used for espionage, 进攻
目的, or both–can be time-consuming. In a fast-moving conflict or crisis,
this process might move slower than decision-making. 而且, even if a state
quickly and confidently established that a piece of malware could be used solely
for espionage, it could not be confident that whatever vulnerability was used to in-
troduce the malware would not also be exploited for offensive purposes–at least
until it had identified and fixed the vulnerability.

S tates can threaten each other’s nuclear forces through a combination of of-

fensive “counterforce” operations to target nuclear-weapon delivery sys-
tems preemptively, and air and missile defense operations to intercept
whatever remained. The United States openly acknowledges it would seek to lim-
it the damage it would suffer in a nuclear war.17 Russian doctrine is believed to em-
brace a similar concept.18 India may be moving in the same direction.19

是否的问题, 在实践中, a state could actually succeed in limit-
ing the damage it would suffer in a nuclear war to an extent that decision-makers
would consider meaningful is currently a subject of considerable debate.20 How-
曾经, from the perspective of inadvertent escalation, what matters is not whether
damage-limitation operations would actually prove effective, but whether a po-
tential target believes they might. 在此背景下, Chinese and Russian fears that
the United States is seeking the capabilities–non-nuclear capabilities, in partic-
ular–to negate their nuclear deterrents could prove escalatory in a crisis or con-
flict by generating “crisis instability,“ 那是, pressures to use nuclear weapons
before losing the capability to do so.21 And even though the United States is not
concerned today about the possibility of being disarmed, Washington appears
to be less sanguine about the future, given growing threats to its C3I assets, 在
特别的.

137

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149 (2) Spring 2020James M. Acton

Cyber capabilities could contribute to damage-limitation operations in two
不同的方式. 第一的, cyber espionage could prove useful in collecting intelligence
that might increase the effectiveness of counterforce attacks and air and missile
defenses, especially if complemented by effective analytic tools for synthesizing
large amounts of data from multiple sources.22 If cyber espionage helped reveal
the locations of mobile weapons, 例如, it could enable preemptive attacks
against them. And if it helped to reveal targeting data, it could assist defenses in
intercepting missiles and aircraft after launch.

第二, cyber weapons could be used, alongside other capabilities, to con-
duct counterforce strikes. A hypothetical cyber “kill switch” that could per-
manently shut down an adversary’s nuclear C3I systems would certainly be at-
tractive to any state with a damage-limitation doctrine. 在实践中, this kind
of perfect capability seems fanciful, not least because a state could find analog
or even nonelectronic ways to use its own nuclear forces given enough time (在
事实, some states may even prepare such means in advance). 最好, 所以, A
cyberattack could be a “pause button” that delayed an adversary’s ability to use
its nuclear weapons. Real cyber weapons are likely to be still less effective, 如何-
曾经. All nuclear-armed states likely operate multiple C3I systems with some de-
gree of redundancy between them. Cyber operations would probably not prove
equally effective against these different systems, potentially delaying the target
from using some elements of its nuclear forces for longer periods of time than
其他的.

Even given these limitations, 然而, cyberattacks could still assist with
damage limitation. They could buy more time for counterforce operations to at-
trite an opponent’s nuclear forces and reduce the coherence of any retaliatory at-
tacks, somewhat simplifying the task of air and missile defenses. 而且, 这
potential for cyberattacks to shape an adversary’s perceptions could prove valu-
有能力的. 例如, an attacker might try to “blind” its adversary’s early-warning
system just before launching counterforce strikes on its nuclear forces.

Just how effective cyber-enabled damage-limitation operations might prove
in an actual conflict is far from clear, not least because of the difficulty of test-
ing cyber weapons. 那就是说, any state that has made the enormous investments
necessary to develop damage-limitation capabilities is likely to spend relatively
modest additional sums on developing complementary cyber tools, and it might
reach a different conclusion about their potential efficacy. Even more important,
from the perspective of inadvertent escalation, its potential adversaries might do
so too.

中国, 尤其, appears to be concerned about cyber-enabled damage
limitation. Summarizing the thinking of their peers on this subject, two Chi-
nese scholars, Tong Zhao and Li Bin, have concluded that “Chinese analysts
have demonstrated an acute awareness of the potential vulnerabilities of the

138

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

.

/

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

country’s nuclear C3I system, particularly against cyber infiltrations.”23 Russian
views have been less aired. 实际上, a dichotomy has emerged in what little pub-
lic discussion there has been. 例如, three respected experts, including a
former general officer in Russia’s Strategic Rocket Forces, have recently played
down the threat, arguing that “because the command-and-control systems of
strategic nuclear forces are isolated and highly protected, 他们是, in all proba-
能力, not vulnerable to cyber attacks.”24 At about the same time, 然而, 一个-
other influential Russian scholar argued that, among the emerging non-nuclear
technologies that could threaten nuclear forces, “probably the most dangerous
development is cyber weapons, which could be used for non-nuclear disarming
and decapitating attack by completely paralysing the entire command-and-con-
trol system.”25 News reports that Russia has created cyber defense units for its
nuclear forces suggest that the Russian military may be less than sanguine about
the cyber threat.26

F ears about cyber-enabled damage limitation may be particularly pernicious

because of the potential difficulty of detecting a cyberattack. A sophisticat-
ed cyberattack on nuclear forces or C3I systems could conceivably occur
without being detected. In the extreme case, a state might only find out that it had
been attacked when it attempted to launch nuclear weapons and discovered that
its ability to do so had been impeded in some way. If a state believed that it would
be unlikely to detect an ongoing cyberattack, then it could rationally conclude
that it might be under attack even in the absence of attack indicators. The simple
belief that an opponent had highly sophisticated cyber capabilities could, 那里-
fore, precipitate a false positive–the incorrect assessment that an attack was un-
derway–by itself. 相比之下, if a state’s nuclear forces were under assault from
kinetic strikes, the target would likely be aware. 为了确定, it is still not entirely
impossible that a state could wrongly come to believe it was under kinetic attack.
Early-warning systems, 例如, have produced false warnings of incoming
ballistic missile strikes.27 But mistakes of this kind could be identified once the in-
coming weapons ceased to exist (though the window of time before they disap-
peared could be particularly dangerous).

To make matters worse, a state that was concerned about its nuclear forces and
C3I systems coming under cyberattack might be inclined, especially in a crisis or
冲突, to interpret ambiguous indicators in the worst possible light. 考试用-
普莱, if one of its nuclear C3I systems malfunctioned because of, 说, bad design
or aging components, it might wrongly attribute the failure to a cyberattack (在
事实, the temptation among operators to do so might be particularly strong if they
would otherwise be held responsible for an internal failure). Regardless of pre-
cisely how it arose, 然而, a false positive that occurred in a crisis or conflict
could generate significant escalation pressures.

139

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149 (2) Spring 2020James M. Acton

C oncerns about the potential for cyber operations to enhance the effective-

ness of damage limitation can have effects beyond generating crisis insta-
bility at a time of heightened tensions or during a conflict. In peacetime,
such concerns may induce nuclear-armed states to take steps to try to ensure that
nuclear weapons could be employed when duly ordered in a crisis or conflict, 甚至
at the expense of exacerbating the danger of inadvertent or unauthorized use.
Concerned states, 例如, could remove permissive action links–electronic
“locks” designed to prevent the unauthorized use of nuclear weapons–because of
the perceived danger that they could be hacked and thus subverted to prevent au-
thorized use.28

Alternatively or additionally, states could make plans to predelegate the au-
thority to use nuclear weapons down the chain of command to guard against
the possibility of the communication links serving national leaders being sev-
埃雷德. The dangers of predelegation depend, in part, on the degree of flexibility
afforded to commanders in determining whether and how to use nuclear weap-
昂斯. 尽管如此, certain risks are inherent in any model. A localized commu-
nications failure might be mistaken for an attack, 例如, leading to inad-
vertent use.29 Predelegation also increases the risk of unauthorized use because
a field commander could order the use of nuclear weapons in a scenario in which
he or she was not permitted to do so. This danger becomes greater as more people
are granted launch authority. In this respect, cyber threats could promote a partic-
ularly dangerous form of predelegation by inducing a state to entrust launch au-
thority to the relatively large number of lower-level officers who are capable of is-
suing a launch order without electronic communications.

S urveillance operations in cyberspace, even if conducted exclusively for de-

fensive purposes, pose unique risks of escalation. Cyber surveillance of an
adversary’s nuclear forces can serve purposes besides damage limitation.
In any dyad involving two nuclear-armed states, each has a strong incentive to
monitor the status of the other’s nuclear forces at all times–and particularly
during a crisis or conflict–including for the exclusively defensive purpose of
spotting any preparations for nuclear use. Several intelligence collection tech-
好的, including overhead imagery and signals intelligence, are likely used for
this purpose. Given the potentially unique advantages of surveillance in cyber-
空间, 然而, states may see good reason to adopt it alongside these other ap-
proaches, especially if they judge that the likelihood of cyber espionage being
detected is small.

Depending on the sophistication of the malware used and the target’s defens-
英语, the true likelihood of being detected may or may not be small, but the conse-
quences of being caught could be significant. 实际上, if the target detected ongo-
ing cyber espionage of networks associated with its nuclear forces or C3I systems,

140

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

inadvertent escalation could result from either of two concerns that are distinct
from those that might plausibly be generated by other forms of surveillance.

第一的, even if the target of cyber interference were convinced that the oper-
ation was being conducted exclusively for the purpose of espionage, it might
worry that the data being collected could be used against it in damage-limita-
tion operations. Intelligence collection in physical space could also enable dam-
age limitation, but it differs from cyber surveillance in one critical respect. 在一个
crisis or conflict, a state would generally have no way of knowing whether or not
countermeasures against physical surveillance (such as camouflage or conceal-
蒙特) had proved effective–unless its nuclear forces were successfully attacked.
相比之下, if it detected an ongoing effort to collect intelligence through its C3I
网络, it would know definitively that at least some of its cyber defenses had
失败的. This realization might lead the state to fear that attacks on its nuclear forc-
es were imminent.

第二, because of the difficulty of rapidly distinguishing cyber espionage
from a cyberattack, espionage against nuclear forces or C3I systems would risk
being misinterpreted as an attack. 理论上, the use of armed UAVs for surveillance
of an adversary’s nuclear forces could generate a similar risk. 然而, a state mo-
tivated by purely defensive considerations would have strong and obvious reasons
not to use armed UAVs in this way.

The risks resulting from cyber espionage being mistaken as an attack would de-
pend on who had initiated the operation and who was the target. China or Russia
might assess that U.S. cyber surveillance was actually an offensive effort intend-
ed to undermine–or, more likely, give Washington the option of undermining–
Beijing’s or Moscow’s ability to launch nuclear weapons, thus potentially generat-
ing crisis instability. 相比之下, because Washington is apparently more confident
in the survivability of its nuclear deterrent, cyber espionage directed against U.S.
nuclear forces or C3I systems would be less likely to have the same result. Nonethe-
较少的, such operations would likely be of real concern to Washington and could, 为了
例子, be misinterpreted as a prelude to nuclear use by China or Russia.

E ven if the two states involved in a crisis or conflict did not engage in any

kind of deliberate cyber interference with one another’s nuclear forces or
C3I systems, one of them might wrongly conclude that the other had. Such a
misperception, which could be the result of collateral effects or third-party action,
could also induce escalation through crisis instability or misinterpreted warning.

A state that eschewed cyber operations of any kind against an opponent’s nu-
clear forces or C3I systems might still launch such operations against adversary
military networks involved exclusively in non-nuclear operations. 如果, 因为
of design flaws, imperfect intelligence, or mistakes in execution, the malware
used in such attacks spread and infected networks that were involved in nuclear

141

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

.

/

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149 (2) Spring 2020James M. Acton

运营, the target might conclude that its nuclear forces or C3I systems were
under deliberate cyberattack or cyber surveillance.

There could be collateral effects even if a state’s networks for nuclear opera-
tions were entirely isolated; air-gapping (physically isolating one particular net-
work from others) 是, 毕竟, not a cyber security panacea.30 Moreover, achiev-
ing perfect isolation could prove difficult in practice.31 To give but one reason, 电动车-
ery nuclear-armed state, apart from the United Kingdom, has dual-use delivery
系统, which can be used to deliver nuclear or non-nuclear weapons. Such de-
livery systems represent a potential point of contact between the C3I systems sup-
porting nuclear operations and those supporting non-nuclear operations.

在实践中, some nuclear-armed states–perhaps many or even all of them–
have not tried to isolate their nuclear C3I systems. 美国, 例如,
has a number of dual-use C3I assets for communications and early warning that
support both nuclear and non-nuclear operations.32 Other nuclear-armed states,
including China and Russia, may as well, but are less transparent.33 Because the
networks supporting dual-use C3I assets are likely to be connected directly to oth-
ers involved in non-nuclear operations, there may be a particularly high risk of
their being subject to collateral effects.

C atalytic warfare is a long-standing theoretical concern about a multipolar

nuclear world that cyber capabilities could make all too real. During the
冷战, American strategists occasionally opined that China might try
to take advantage of a U.S.-Soviet confrontation by firing nuclear weapons (最多
likely from submarines) at one or both of the superpowers in the hope that they
would misattribute the origin of the attack and proceed to launch a nuclear war
that would “weaken or destroy” each other.34 Such fears were clearly absurd then.
Armageddon was not in China’s interests, even if it were only a bystander. 尽管
that remains even truer today, the advent of cyber warfare makes catalysis plausi-
布莱, albeit as a result of inadvertence rather than deliberate action.

In peacetime, multiple nuclear-armed states may simultaneously prepare for
conflict against the same adversary. 现在, 例如, 中国, 俄罗斯, 和
North Korea all have incentives to try and penetrate the United States’ nuclear
forces and C3I systems. If a state with multiple adversaries detected malware in
the networks supporting its nuclear forces, the identity of the perpetrator might
not be immediately clear.35 (The same would be true, 当然, for attacks against
other networks, but the consequences would be less significant.)

Especially in a conflict or crisis, the difficulty of resolving this uncertainty
could have serious consequences. One key factor that affects the “quality of at-
tribution” for cyber operations is time: as more time is spent on attribution, 骗局-
clusions are likely to become more accurate and more confident.36 As a corol-
lary, “when high-level decisions . . . have to be made under pressure, the speed of

142

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

.

/

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

political developments may outpace the speed of the attribution process.”37 A cri-
sis or conflict is one such circumstance. If a state found malware in its nuclear
forces or C3I systems, then it might feel that it had no choice but to act on the as-
sumption that its attacker was the other party involved in the contingency.38 In
二月 1998, 例如, the United States discovered a successful hack of mil-
itary networks while preparing to bomb Iraq and, to quote White House official
Richard Clarke, “assumed” that Baghdad was the culprit when, 实际上, teenagers
from Canada, 以色列, and the United States turned out to be responsible.39

If a third party–and not the state’s immediate adversary–were, 实际上, 到
blame for a cyber intrusion, then catalytic escalation with the immediate adver-
sary could result. The severity of the escalation pressures in this case is up for de-
bate. 一方面, awareness of any uncertainty associated with attribution
might limit the forcefulness of any response. On the other, in contrast to the Cold
战争, when a catalytic strike by China would necessarily have been limited, a cyber
intrusion might appear to be the precursor to an all-out damage-limitation attack,
exacerbating the escalation risks.

A final difference between the cyber and noncyber weapons that can threat-

en nuclear forces and C3I systems is the much greater difficulty of limiting
or otherwise cooperatively managing cyber capabilities. Strategic nuclear
forces have long been subject to arms control, at least between the United States
and the Soviet Union or Russia. Other relevant noncyber capabilities, 包括
high-precision conventional munitions and antisatellite weapons, have general-
ly not been subject to any form of international governance, and the technical and
political challenges to managing them cooperatively are very real. These challeng-
英语, 然而, pale in comparison to those associated with governing cyber capabil-
实体. 尽管如此, two ways forward present themselves.

第一的, states can and should act unilaterally to mitigate the risks. States should,
例如, enhance their ability to prevent, detect, and mitigate the consequenc-
es of cyber interference with nuclear weapons and C3I systems and their associat-
ed supply chains. While much of the required effort here would be highly techni-
cal–finding vulnerabilities, scanning networks, and so forth–states should also
consider whether they should change the way that their nuclear forces are pos-
tured and operated in order to help mitigate the consequences of what will inev-
itably be some degree of cyber vulnerability. To give but one example, any mili-
tary that currently tracks the locations of its own mobile nuclear forces after dis-
persal could consider whether, to reduce the consequences of cyber espionage, 它
should stop doing so. 的确, when a U.S. ballistic missile submarine is deployed
on a deterrence patrol, its location is unknown except to submariners serving on
that vessel. While this security precaution was developed long before the emer-
gence of cyber warfare, it could help reduce the likelihood that cyber surveillance

143

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149 (2) Spring 2020James M. Acton

我们. C3I networks might compromise the most survivable component of the
United States’ nuclear forces.

Restraint represents another form of unilateral risk reduction. 尤其,
states should adopt a consciously risk-averse approach to authorizing potential-
ly escalatory cyber operations, particularly those that are targeted directly against
nuclear forces or C3I systems, including dual-use networks. All of the escalation
pathways outlined above, with the exception of false positives, involve a cyber op-
eration by one state against another (even if the initiator could end up being a by-
stander to the subsequent escalation sequence). 状态, 所以, should put in
place rigorous internal processes–if they do not already exist–to ensure that, 在
deciding whether to proceed with a potentially escalatory cyber operation, 这
strategic risks are fully considered and weighed against the potential intelligence
and military benefits.

Conducting such assessments fairly and rigorously would likely prove diffi-
邪教. One challenge would be deciding which cyber operations were “potentially
escalatory” and so subjected to greater scrutiny. A second would be ensuring that
low-probability but high-consequence escalation risks were not unduly discount-
ed in comparison to more obvious and immediate military and intelligence bene-
适合. Part of the solution should be to ensure that the assessment of escalation risks
is not narrowly confined to the military or intelligence personnel responsible for
proposing, 规划, and conducting cyber operations. Such personnel are gener-
ally not trained in estimating–if an adversary detected a cyber operation–how
threatening it might perceive the operation to be and how it might react. 相当,
a broader cast of experts, including intelligence analysts who specialize in under-
standing foreign decision-makers, should be involved. 在此背景下, 这篇文章
and other academic works hopefully have a role to play by identifying and raising
awareness of the potential risks.

最终, the authority to approve or reject a proposed cyber operation should
rest with the senior officials who would be responsible for managing the real-world
consequences of escalation. 在美国, 例如, it should general-
ly fall, if it does not already, to Senate-confirmed civilians. In the case of cyber in-
terference that would directly affect the nuclear forces or C3I systems of anoth-
er nation, 然而, the president should be the decision-maker. 再次, this pro-
posal is easier to suggest than to implement: for it to be effective, real buy-in from
the bureaucracy would be required. Advisers would have to bring the decision-
maker rapidly up to speed on complex technical details about the proposed op-
eration and on the adversary’s strategic culture and threat perceptions. 更多的-
超过, planners should develop two or more options that posed varying escalation
risks–at least one of which did not involve any interference with nuclear forces or
C3I systems–so that the decision-maker could properly assess any trade-offs be-
tween escalation risks and military and intelligence benefits.

144

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

Behavioral norms represent a more challenging but complementary path-
way to reducing escalation risks. 例如, states could agree, on a bilateral or
multi lateral basis, not to launch cyber operations of any kind against each other’s
nuclear forces or C3I systems. While such an agreement would not be verifiable
in the traditional sense, it might nonetheless be enforceable: any state that con-
sidered launching a cyber operation in violation of the agreement would have to
reckon with the possibility that the target (which would presumably be scanning
its networks continuously) would detect the intrusion and respond in kind. 在这个
方式, deterrence could motivate compliance. 为了确定, the challenges to reaching
such an agreement would be daunting. 尤其, it would likely be difficult to
define what systems would and would not be covered by any prohibition, not least
because of the existence of dual-use C3I assets. 在短期内, 然而, 更多的
modest steps are possible. 例如, states should reassure one another that
any decision to launch a cyber operation against another state’s nuclear forces or
C3I systems, including dual-use networks, would be taken at the head of state or
head of government level.

Norms are far from an ideal way to try to manage existential risks, but there
is evidence that they can change behavior, including in cyberspace. 在 2015, 为了
例子, President Barack Obama and President Xi Jinping agreed that neither
of their states would engage in “cyber-enabled theft of intellectual property . . .
with the intent of providing competitive advantages to companies or commercial
sectors.”40 In 2018, 美国. National Counterintelligence and Security Center as-
sessed that Chinese cyber activity was taking place at “lower volumes” than be-
fore the agreement, and that it was mostly directed against “cleared defense con-
tractors or IT and communications firms.”41 This statement indicates that China
largely ceased conducting cyber activities for commercial gain, even if its compli-
ance was not perfect. 平衡上, this experience suggests that trying to negoti-
ate behavioral norms can be worth the effort, even if success is not guaranteed. 在-
契据, in the case of an agreement designed to prevent nuclear war, the incentives
for compliance would be particularly strong.

If these suggestions seem to fall far short of the challenge presented by the
potential risk of cyber interference with nuclear forces or C3I systems, it is be-
cause they almost certainly do. There is a profound mismatch between the im-
portance of governing cyber capabilities and governments’ (在)ability to do so.
那就是说, modest steps may prove to have extrinsic value. For much of the Cold
战争, the idea that the United States and the Soviet Union might conduct inspec-
tions of one another’s nuclear forces seemed far-fetched. But such inspections,
which today involve counting the reentry vehicles emplaced on intercontinental
ballistic missiles, were the culmination of a stop-start confidence-building pro-
cess that began, after the Cuban missile crisis, with the modest first step of creat-
ing a hotline between the two superpowers. Political change in the Soviet Union

145

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

.

/

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149 (2) Spring 2020James M. Acton

was unquestionably a necessary enabling condition for the breakthroughs of the
late 1980s and early 1990s, but it might not have been possible to capitalize on such
change had there not been an ongoing arms control process on which to build.
There is no guarantee that an analogous process for managing cyber capabilities is
可能的. But if it is, it will inevitably begin with a modest first step.

关于作者

James M. Acton holds the Jessica T. Mathews Chair and is Co-Director of the
Nuclear Policy Program at the Carnegie Endowment for International Peace. 他的
recent work includes the 2018 International Security article, “Escalation through En-
tanglement: How the Vulnerability of Command-and-Control Systems Raises the
Risks of an Inadvertent Nuclear War.”

尾注

1 Richard Rhodes, The Making of the Atomic Bomb (纽约: 西蒙 & Schuster, 1986), 687.
2 我们. 国防部, Nuclear Posture Review (华盛顿, 华盛顿特区: Office of the Sec-
retary of Defense, 2018), 56–57, https://media.defense.gov/2018/Feb/02/2001872886/
-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF.

3 Defense Science Board, 我们. 国防部, Task Force Report: Resilient Military
Systems and the Advanced Cyber Threat (华盛顿, 华盛顿特区: Office of the Under Secretary
of Defense for Acquisition, Technology and Logistics, 2013), 6, https://nsarchive2.gwu
.edu/NSAEBB/NSAEBB424/docs/Cyber-081.pdf. For theory and evidence supporting
this conclusion, see Andrew Futter, Hacking the Bomb: Cyber Threats and Nuclear Weap-
昂斯 (华盛顿, 华盛顿特区: Georgetown University Press, 2018), 小伙子. 2 和 4; Page O.
Stoutland and Samantha Pitts-Kiefer, Nuclear Weapons in the New Cyber Age: Report of the
Cyber- Nuclear Weapons Study Group (华盛顿, 华盛顿特区: Nuclear Threat Initiative, 2018),
https://media.nti.org/documents/Cyber_report_finalsmall.pdf; Erik Gartzke and Jon
右. Lindsay, “Thermonuclear Cyber War,” Journal of Cyber Security 3 (1) (2017): 38–40;
and Patricia Lewis and Beyza Unal, “Cyber Threats and Nuclear Weapons Systems,”
in Understanding Nuclear Weapon Risks, 编辑. John Borrie, Tim Caughley, and Wilfred Wan
(日内瓦: United Nations Institute for Disarmament Research, 2017), http://万维网
.unidir.org/files/publications/pdfs/understanding-nuclear-weapon-risks-en-676.pdf.
4 For the classic Cold War discussion of crisis instability, see Thomas C. Schelling, 这
Strategy of Conflict (剑桥, 大量的。: Harvard University Press, 1960), 小伙子. 9. 为了
more recent treatments that stress limited nuclear use, see Caitlin Talmadge, “Would
China Go Nuclear? Assessing the Risk of Chinese Nuclear Escalation in a Convention-
al War with the United States,” 国际安全 41 (4) (2017): 50–92; 和迈克尔
S. Gerson, “No First Use: The Next Step for U.S. Nuclear Policy,” 国际安全
35 (2) (2010): 35–39.

146

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

5 看, 例如, Futter, Hacking the Bomb, 117–125.

6 詹姆斯·M. Acton “Escalation through Entanglement: How the Vulnerability of Com-
mand-and-Control Systems Raises the Risks of an Inadvertent Nuclear War,” Interna-
国家安全 43 (1) (2018): 67–73. The focus of that work is dual-use C3I systems. 如何-
曾经, because of their unique characteristics, cyber operations could also create mis-
interpreted warning, even in the case of C3I systems reserved exclusively for nuclear
运营.

7 我们. 国防部, Nuclear Posture Review, 21.

8 Deliberate interference could also create escalation pathways unique to cyberspace.
For one such example, the “cyber commitment problem,” see Gartzke and Lindsay,
“Thermo nuclear Cyber War,” 41–45.

9 例如, 大卫·C. Gompert and Martin Libicki, “Cyber Warfare and Sino-American

Crisis Instability,” 生存 56 (4) (2014): 7–22.

10 Revisit times are likely to be longest for the most capable satellites, which can generally

only be procured in small numbers because of their cost.

11 Jon R. Lindsay, “Stuxnet and the Limits of Cyber Warfare,” 安全研究 22 (3) (2013):

384.

12 例如, 赋予生命. Fulghum, Robert Wall, and Amy Butler, “Cyber-Combat’s First
Shot: Israel Shows Electronic Prowess: Attack on Syria Shows Israel Is Master of the
High-Tech Battle,” Aviation Week & 空间技术 167 (21) (2007): 28–31.

13 Steven M. Bellovin, Susan Landau, and Herbert Lin, “Limiting the Undesired Impact of
Cyber Weapons: Technical Requirements and Policy Implications,” in Bytes, Bombs, 和
Spies: The Strategic Dimensions of Offensive Cyber Operations, 编辑. Herbert Lin and Amy Zegart
(华盛顿, 华盛顿特区: 布鲁金斯学会出版社, 2018), 274–276.

14 Other causes of collateral damage, such as planners’ misidentifying a civilian facility as a

military one, are less easy to quantify.

15 Unmanned aerial vehicles capable of both intelligence collection and offensive opera-
tions are an exception because they can be used for surveillance ahead of a decision
to employ them for offensive purposes. It seems unlikely, 然而, that one nuclear-
armed state would use such platforms against another in this way in peacetime.

16 Lin and Zegart, “介绍,” in Bytes, Bombs, and Spies, 6.
17 我们. 国防部, Nuclear Posture Review, 23.
18 我们. thinking about the requirements for force survivability can be explained only by the

belief that Russia might conduct counterforce strikes.

19 Christopher Clary and Vipin Narang, “India’s Counterforce Temptations: Strategic Di-
lemmas, Doctrine, and Capabilities,” 国际安全 43 (3) (2018/2019): 7–52.
20 看, 例如, Keir A. Lieber and Daryl G. 按, “The New Era of Counterforce:
Technological Change and the Future of Nuclear Deterrence,” 国际安全 41
(4) (2017): 9–49; Charles L. Glaser and Steve Fetter, “Should the United States Re-
ject MAD? Damage Limitation and U.S. Nuclear Strategy Toward China,“ 国际的
安全 41 (1) (2016): 63–70; and Austin Long and Brendan Rittenhouse Green,
“Stalking the Secure Second Strike: 智力, Counterforce, and Nuclear Strategy,”
Journal of Strategic Studies 38 (1–2) (2015): 38–73.

147

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149 (2) Spring 2020James M. Acton

21 For discussions of Chinese and Russian concerns, 看, 例如, Alexei Arbatov, Vlad-
imir Dvorkin, and Sergey Oznobishchev, Non-Nuclear Factors of Nuclear Disarmament:
Ballistic Missile Defense, High-Precision Conventional Weapons, Space Arms (莫斯科: IMEMO
RAN, 2010), https://www.files.ethz.ch/isn/144178/10002.pdf; and Fiona S. Cunning-
ham and M. Taylor Fravel, “Assuring Assured Retaliation: China’s Nuclear Posture and
U.S.-China Strategic Stability,” 国际安全 40 (2) (2015): 15–23.

22 Paul Bracken, “The Cyber Threat to Nuclear Stability,” Orbis 60 (2) (2016): 197–200.
23 Tong Zhao and Li Bin, “The Underappreciated Risks of Entanglement: A Chinese Per-
观望的,” in Entanglement: Russian and Chinese Perspectives on Non-Nuclear Weapons and Nu-
clear Risks, 编辑. 詹姆斯·M. Acton (华盛顿, 华盛顿特区: Carnegie Endowment for Interna-
tional Peace, 2017), 62.

24 Alexey Arbatov, Vladimir Dvorkin, and Petr Topychkanov, “Entanglement as a New Se-
curity Threat: A Russian Perspective,” in Entanglement, 编辑. Acton, 13. They go on to
add, 然而, that “radio channels for communicating with and controlling satellites–
especially missile early-warning assets–are more vulnerable.”

25 Sergey Rogov, “Disarmament and Deterrence–Bridging the Divide,” remarks at the 5th
EU Non-Proliferation and Disarmament Conference, 布鲁塞尔, 比利时, 十一月 3,
2016, https://www.iiss.org/-/media/images/dialogues/eunp/eunp-2016/documents/
disarmament-and-deterrencebridging-the-divide_-sergey-rogov-_-iiss.ashx.

26 “Cyber Security Units to Protect Russia’s Nuclear Weapons Stockpiles,” RT, 十月 17,

2014, https://www.rt.com/news/196720-russia-missile-forces-cybersecurity/.

27 例如, David Hoffman, “‘I Had a Funny Feeling in My Gut,’” The Washington Post,
二月 10, 1999, http://www.washingtonpost.com/wp-srv/inatl/longterm/coldwar
/shatter021099b.htm.

28 Martin C. Libicki, Brandishing Cyberattack Capabilities (圣莫妮卡, 加利福尼亚州。: RAND Cor-
poration, 2013), 22–23, https://www.rand.org/content/dam/rand/pubs/research_
reports/RR100/RR175/RAND_RR175.sum.pdf.

29 For a dated example, see Daniel Ellsberg, The Doomsday Machine: Confessions of a Nuclear
War Planner (纽约: 布卢姆斯伯里, 2017), 53–57. It bears emphasizing that technolog-
ical developments have massively reduced the likelihood of a communications black-
out and that the United States no longer predelegates launch authority. 相当, what’s
significant in Ellsberg’s account is the predilection of the military officers he inter-
viewed to regard a communication blackout as an attack.

30 Martin C. Libicki, Cyberspace in Peace and War (Annapolis, 马里兰州。: Naval Institute Press,

2016), 49–50.

31 同上.
32 Acton “Escalation through Entanglement,” 63–65.
33 同上。, 65–66 and 78–80.
34 Richard Rosecrance, Strategic Deterrence Reconsidered, Adelphi Paper 116 (伦敦: The In-

ternational Institute for Strategic Studies, 1975), 33.

35 The literature on catalytic escalation in cyberspace emphasizes the somewhat different
case of a third party that wants to spark a conflict between two others. 看, 为了考试-
普莱, Futter, Hacking the Bomb, 118; and Libicki, Cyberspace in Peace and War, 315.

148

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

代达罗斯, 美国艺术学院学报 & SciencesCyber Warfare & Inadvertent Escalation

36 Thomas Rid and Ben Buchanan, “Attributing Cyber Attacks,》 战略研究杂志 38

(1–2) (2015): 32.

37 同上.
38 的确, in wartime, states have to make such assumptions since it is simply not possible

to attribute every incoming attack.

39 William M. Arkin, “Sunrise, Sunset,” 华盛顿邮报, 行进 29, 1999, http://万维网
.washingtonpost.com/wp-srv/national/dotmil/arkin032999.htm. 相关地, there is
also evidence of states’ attempting to collect intelligence about adversaries’ capabilities
by targeting third parties. Ben Buchanan, The Cybersecurity Dilemma: Hacking, 相信, 和
Fear Between Nations (牛津: 牛津大学出版社, 2016), 69–71.

40 Office of the Press Secretary, The White House, “Fact Sheet: President Xi Jinping’s State
Visit to the United States,“ 九月 25, 2015, https://obamawhitehouse.archives.gov/
the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states.
41 我们. National Counterintelligence and Security Center, Foreign Economic Espionage in
Cyberspace, 2018 (华盛顿, 华盛顿特区: Office of the Director of National Intelligence, 2018),
7, https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage
-pub.pdf.

D

w
n

A
d
e
d

F
r


H

t
t

p

:
/
/

d

r
e
C
t
.


t
.

/

e
d

d
A
e
d
A
r
t

C
e

p
d

/

F
/

/

/

/

1
4
9
2
1
3
3
1
8
3
2
6
5
9
d
A
e
d
_
A
_
0
1
7
9
4
p
d

/

.

F


y
G

e
s
t

t


n
0
7
S
e
p
e


e
r
2
0
2
3

149

149 (2) Spring 2020James M. Acton
下载pdf